Paper ID #15299Capstone Projects in a Computer Engineering Program Using ArduinoDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah
Paper ID #14793Cross-Cohort Research Experience for Project Management and LeadershipDevelopmentDr. Yung-Hsiang Lu, Purdue University Yung-Hsiang Lu is an associate professor in the School of Electrical and Computer Engineering and (by courtesy) the Department of Computer Science of Purdue University. He is an ACM distinguished scientist and ACM distinguished speaker. He is a member in the organizing committee of the IEEE Rebooting Computing Initiative. He is the lead organizer of the first Low-Power Image Recognition Challenge in 2015, the chair (2014-2016) of the Multimedia Communication Systems Interest Group in
Systems he worked with Cisco customers designing and deploying core Internet designs and technologies. In 2005 Mr. Smith earned a master’s degree in Computer Science from Colorado State and 1 year later left industry to teach engineering at Oklahoma Christian University. Mr. Smith’s emphasis is in first year student success, mentoring young engineers, and data communications. He consistently scores well in student feedback and enjoys regular strong relationships with his students and classes. c American Society for Engineering Education, 2016Developing an Android-based Layer 3 Switch as a senior projectAbstractA project-based course has been designed with a goal of developing an in-depth
42 49Associate 6 2 12 13Certificate 1 3 12Table 2: Graduation in Computer Science DepartmentLEAP Project Goal and ObjectivesThe goal of the LEAP project is to increase the graduation rate for students in Computer Scienceand Engineering programs at UVU, which is an open enrollment university, and to better preparethem for continued education and/or success in the STEM workforce. This is accomplished byproviding scholarships to academically talented students with financial need and by providingleadership training and opportunities, engaged learning activities, and mentorship (both student-to-student and faculty-to-student) 6.The objectives of the
attributed toindustry and business climate forces, SE educators want to be sure that the foundation whichthey provide to students is sound, realistic and aligned with desired learning outcomes.In this paper, we explore how experience-based software project data can serve as predictors andplay an important role in the management of SE projects. Predominantly, today’s SE curricula donot adequately focus on these aspects. The goal is to present the case for change and to suggestpractical and flexible methods of improvement. To achieve the goal, this paper examines why SEefforts experience high failure rates, how current curricula are structured, the intended learningoutcomes of SE courses, and where there is a gap in the achievement of those outcomes
Paper ID #14777Wireless Network Security Using Raspberry PiDr. Chafic BouSaba, Guilford College * Joined Guilford College in January 2008 * Serves as Assistant Professor in the Computing Technology and information Systems.Ms. Tiera Kazar, Guilford College I am a current student at Guilford College in the Computing Technology & Information Systems depart- ment. I am working on a Capstone project that will be submitted to the ASEE. The project focuses on Wireless Network Security using a Raspberry Pi.Dr. Will C. Pizio, Guilford College I am currently an Associate Professor of Justice and Policy Studies at Guilford
sophomore level. Our major renovation to this class is engaging students in asemester-long group project, which includes formal presentations, research, team work andmultiple active learning exercises. The semester-long group project consists of four phases:communication and planning, modeling, construction, and deployment. Through the four phases,students gradually gain communication, ethics, and teamwork professional skills. Comparisonamong data collected from the four phases show significant improvements of the students’professional skills, particularly presentation skills and teamwork skills.ABET student outcomes and performance indicators ABET student outcomes describe what students are expected to know and be able to do by thetime of
Paper ID #15364Mobile Computing & Security Laboratory DevelopmentDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Dr. Di Ma, University of Michigan - Dearborn Dr. Di Ma is
-Eliciting Activities Learning System (MEALearning.com), a site designed for implementing, managing, and re- searching MEAs in large classes.Rachel Marie Cunningham, Embry-Riddle Aeronautical University - Daytona Beach Graduate Research Assistant at ERAU with an interest in design and creative thinking.Miss Paula Sanjuan Espejo, Embry-Riddle Aeronautical University - Daytona Beach I am an UG Aerospace Engineering student at Embry-Riddle Aeronautical University, Daytona Beach. I am from Spain and I am currently working on the SLA-aBLE project, the Implementation and Evaluation of Second Language Acquisition applied to programming courses. c American Society for Engineering Education, 2016
Paper ID #15885Integrating Software Testing to CS Curriculum Using WRESTT-CyLEDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Dr. Peter J. Clarke, Florida International University
Kee Wook Lee is a senior student at Purdue University, West Lafayette, IN, majored in electrical engi- neering.Dr. David B Nelson, Purdue University, West Lafayette David B. Nelson is Associate Director of the Center for Instructional Excellence at Purdue University. He received his Ph.D in World History from the University of California, Irvine in 2008. David has been involved in many educational research projects at Purdue, including published worked in the programming education, student engagement and academic performance in dynamics engineering courses, and educational modalities in engineering, technology and economics.Dr. Yung-Hsiang Lu, Purdue University Yung-Hsiang Lu is an associate professor in the School
Mathematics (STEM) educational researcher with the Georgia Institute of Technology. His educational experience in the Atlanta area for the past twenty years includes high school mathematics teaching, Math/Science Magnet Program Director, Title I educational data specialist, and Associate Professor of Information Technology. As a former US Air Force electronics engineer, Doug was also an engineering project manager.Jason Freeman, Georgia Institute of Technology Jason Freeman is an Associate Professor of Music at Georgia Tech. His artistic practice and scholarly research focus on using technology to engage diverse audiences in collaborative, experimental, and ac- cessible musical experiences. He also develops educational
(individual and group, in class and outside the class homework) as well as summative assessment?Data analysis and conclusions from the pilot project have been made public to benefit otherfaculty in CS and other SMT fields nationwide.KeywordsChallenge Based Instruction/learning (CBI), Interdisciplinary Studies, Engineering,Computational Science, Computer Graphics, Software Engineering. SMT (Science,Mathematics, and Technology) fields at minority-serving institutions.IntroductionThe advent of the 21st century with its technological advances has witnessed an explosion in theamount of information available to everyone through tools such as search engines, freeencyclopedias, on-line databases, and multimedia content, just to mention a few. The
Paper ID #15359Gamification-Based Cyber-Enabled Learning Environment of Software Test-ingDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Dr. Peter J. Clarke, Florida International
sitting in the Board of Governor of APSIPA.Mr. Phyo Ko Ko, Nanyang Technological University PHYO KO KO received his BEng in Electrical and Electronic Engineering from Nanyang Technological University, Singapore in 2012. He is currently employed as a Project Officer in Digital Signal Processing Lab of School of Electrical and Electronic Engineering in Nanyang Technological University. His interests span in the areas of real-time audio signal processing, Java programming, C++ programming, android software development and audio modulation/demodulation.Mr. Hai Nguyen Duy, Nanyang Technological University Hai Nguyen Duy received his BEng in Electrical and Electronic Engineering from Nanyang Technological University
example, have sprites, costumes, andbackgrounds already created), which allows us to focus on any new CT skills or computerscience principles in a limited timeframe while reducing cognitive load. We continue to reduce the cognitive load, specifically extraneous load (2015)18, byputting scaffolding in place for each activity or project in the interventions. Scaffolding is asupport structure put in place for learners to accomplish tasks that they could otherwise notcomplete7. We take the approach of instructional scaffolding which correlates to programmingtutorials. However, as Repenning notes, direct instruction can actually limit studentmotivation, especially in females25. We utilize Problem-based Learning (PBL) (2009)28alongside Inquiry
generation IP protocol. Wemeasure IPv6 adoption through eight adoption metrics gleaned from eleven datasets. Datacollection covers a two year period from January 2014 through December 2015.In addition, we address the implications of the sudden uptick in IPv6 adoption, as it continues ona path of accelerated expansion. The long awaited transition from IPv4 to IPv6 has implicationsfor all organizations who will soon be making the change; many of which may not be preparedfor how to systematically approach such an undertaking. Factors such as project planning, IPv6saturation, infrastructure assessment, policy redesign, and network continuity are discussed askey areas that will need to be addressed as organizations begin to adopt IPv6.Key words: IPv6
Paper ID #15358Leveraging Online Lab Development: A New Paradigm to Offer EducationalLab Infrastructure as a Cloud ServiceDanilo Garbi Zutin, Carinthia University of Applied Sciences Danilo G. Zutin is currently a Senior Researcher and team member of the Center of Competence in Online Laboratories and Open Learning (CCOL) at the Carinthia University of Applied Sciences (CUAS), Vil- lach, Austria, where he has been engaged in projects for the development of online laboratories, softtware architectures for online laboratories and online engineering in general. Danilo is author or co-author of more than 30 scientific papers
then, many of them have already left the field. It is hypothesized that thislack of clarity of the field at an early point in students’ academic career, coupled with theperception that the curriculum is largely irrelevant to their lives, has impacted the retention ratesof computer science majors in the first two years of their academic study programs. This paperwill report on a preliminary stage of a comprehensive project effort that aims to improveretention rates for computer science students in their entry-level courses through thedevelopment of course modules intended for inclusion in their entry-level curriculum. Thetheoretical basis for these modules will be reviewed and the design framework for thedevelopment of these models is discussed
Paper ID #15901Android-Based Remote Robot Control SystemDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Mr. Md Hossain Shuvo, Alabama A&M University Graduate Student, Dept. of
South Africa,specifically targeting hotels and restaurants. “PoS RAM Scraper Malware - Past, Present, andFuture” 5 includes in-depth specifics on Dexter’s operations. Three additional reportsdemonstrate the impact Dexter has had, as well as some specifics to its character. These reportsare “ASERT Threat Intelligence Brief 2014-3 Dexter and Project Hook Point of Sale MalwareActivity Update Point of Sale Malware Overview PoS Malware Activity : Dexter and ProjectHook” 8, “Visa Data Security Alert - Dexter Malware Targeting Point-of-Sale (POS) Systems” 9,and “Dexter and Project Hook Break the Bank - Inside Recent Point-of-Sale Malware CampaignActivities” 10.The research methodology will consist of a comparative study of the articles listed above
Paper ID #16453Attracting Students to Programming via Physical ComputingProf. Alka R Harriger, Purdue University, West Lafayette Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she has been actively involved in teaching software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Realized through Information Technology) project. Since October 2013, she has been co-leading with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching
preparedcybersecurity workforce to defend IT infrastructure and fight against cybercrimes. It’s projectedthat the US is in an urgent demand of thousands of information security workers. The NationalScience Foundation has established a number of grants to award projects that promotecybersecurity education and curriculum development. Some of these projects have reportedsuccess of teaching hands-on skills through Gamification, a game-like learning environment.CTF (Capture-the-Flag) events are particularly successful in attracting college students, evenfrom non-IT/CS major and high school students into cybersecurity. This paper summarizes thecurrent popular Gamification technologies and the practice of using CTF and competitionprojects in classroom
American Society for Engineering Education (ASEE), serving as the past Program Chair for the Minorities in En- gineering Division. He has served as a chair, vice-chair, program chair, and program committee member for numerous conferences of ASEE.Dr. Mohd Abdelgadir Khairi, Najran University I, Mohamed Khairi, my bachelor degree in computer science. I did my Masters in system science from University of Ottawa, Canada. My PH.D was in ”Master Data Management” from University of Phoenix. I have over 20 years of experience in IT industry - ten of them with Microsoft in Redmond, WA. Currently I’m assistant professor at University of Najran. In addition of teaching and Research I’m coordinator of graduation projects and
and Savarese, Daniel and Dorband, John E and Ranawak, Udaya A and Packer, Charles V, "BEOWULF: A parallel workstation for scientific computation", in Proceedings, International Conference on Parallel Processing vol. 95, (1995).[12] Wikibooks. Building a Beowulf Cluster — Wikibooks, The Free Textbook Project. [online], 2011. http://en.wikibooks.org/w/index.php?title=Building_a_Beowulf_Cluster&oldid=2210594, last viewed December 2014.[13] Frinkle, Karl, and Mike Morris. "Developing a Hands-On Course Around Building and Testing High Performance Computing Clusters." Procedia Computer Science 51 (2015): 1907-1916.[14] Ngxande, Mkhuseli, and Nyalleng Moorosi. "Development of Beowulf Cluster to Perform Large
a client request. Figure 9: Hardware connection diagram for the remote programming system.The main idea of this project was to design an embedded processor system that could beprogrammable from remote locations. An Arduino Mega-2560 microcontroller board was usedas the embedded processor.10 All of the output devices were connected via the Arduino board.ASEE Annual Conference 2016 New Orleans, USFigure 9 shows a schematic diagram of the hardware system, while Figure 10 shows images ofthe completed system.Serial communication was established between the server and experiment set-up to achieveremote programming. When a user uploads a program to the server, it handles the incoming
over twenty years experience designing and supporting learning environments in academic settings. Her research has been funded by the National Science Foundation (an Ethics in Science and Engineering project to develop frameworks for developing ethical reasoning in engineers, and a Cyberlearning project to develop collaborative design environments for engineers), and by corporate foundations, the Department of Homeland Security, the College of En- gineering, and the Purdue Research Foundation. She has been recognized as the inaugural Butler Faculty Scholar, a Faculty Fellow in the CERIAS institute, a Service Learning Faculty Fellow, Diversity Faculty Fellow, and recipient of the Violet Haas Award (for efforts on
intellectually may prevent them from creating an effective solution.The goal of our project was to create narratives (case-studies) that students could understand,relate to, and be engaged with, so they can be used as the contexts to learn problem-solving andprocedural programming skills in the flowcharting component of the PS course. Since studentsknow what is relevant to them, we selected a group of five students majoring in ComputerSystems to help us develop those narratives.The use of student-developed narratives affected performance in different flowcharting structures(sequence, selection, repetition) differently. Overall, the data suggests that the use of case studieswas beneficial for increasing performance in flowcharting assessments using
activities can also automate gradingroutines and facilitates unique testing environments with variable content generation [3]. This isa powerful tool that enables the instructor to create unique assignments, and facilitates for quickand efficient grading of complex configurations.3. ConclusionsInstead of having to choose using either PT or GNS3 for network development, it might be aneven better idea to use them both together. As previously discussed, both programs target distinctaspects of an overall project, and can be used to complement each other. PT can be used to createa networking plan that incorporates the internal and external functions of a network. PT couldfurther facilitate ease of assessment and automated grading. GNS3, on the other hand
case studies.ProjectsAs part of the class students will complete a project and have the option to complete a secondproject to replace one lab. 1. Dropbox a. Students will create a discrete host that can be used as a work-around when a firewall has interrupted a security assessment. Students will learn about reverse SSH tunneling and other methods of circumnavigating a firewall, as well as what policies might fend off an attempt to place a dropbox within their own organization. 2. Build Your Own Lab a. This is a chance for students to develop their skills in an area of their choice by designing a lab which they think would be of value to their own studies and the